Advertisement

Topics

PubMed Journals Articles About "SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods" RSS

23:05 EST 11th December 2018 | BioPortfolio

SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods articles that have been published worldwide.

More Information about "SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods" on BioPortfolio

We have published hundreds of SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods news stories on BioPortfolio along with dozens of SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods Clinical Trials and PubMed Articles about SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods Companies in our database. You can also find out about relevant SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods Drugs and Medications on this site too.

Showing "SCIEX Announces BioPharmaView Software Streamlining Multiple Attribute Methods" PubMed Articles 1–25 of 22,000+

Multi-Modal Joint Clustering With Application for Unsupervised Attribute Discovery.

Utilizing multiple descriptions/views of an object is often useful in image clustering tasks. Despite many works that have been proposed to effectively cluster multi-view data, there are still unaddressed problems such as the errors introduced by the traditional spectral-based clustering methods due to the two disjoint stages: 1) eigendecomposition and 2) the discretization of new representations. In this paper, we propose a unified clustering framework which jointly learns the two stages together as well a...


Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the attribute. For monetary gain, a malicious authorized user may reveal his/her decryption key to a third party, and it is difficult to trace the owner of primitive secret key from an exposed key. At the same time, this situation may also limit commercial appl...

Prediction of Biochemical Endpoints by the CORAL Software: Prejudices, Paradoxes, and Results.

Quantitative structure-activity relationships (QSARs) for prediction of toxicological endpoints built up with the CORAL software are discussed. Prejudices related to these QSAR models are listed. Possible ways to improve the software are discussed.


Multiple Testing Tool to Detect Combinatorial Effects in Biology.

Detecting combinatorial effects is important to various research areas, including biology, genomics, and medical sciences. However, this task was not only computationally nontrivial but also extremely difficult to achieve because of the necessity of a multiple testing procedure; hence few methods can comprehensively analyze high-order combinations. Recently, Limitless Arity Multiple-testing Procedure (LAMP) was introduced, allowing us to enumerate statistically significant combinations from a given dataset....

Comprehensive comparative analysis of methods and software for identifying viral integrations.

Many viruses are capable of integrating in the human genome, particularly viruses involved in tumorigenesis. Viral integrations can be considered genetic markers for discovering virus-caused cancers and inferring cancer cell development. Next-generation sequencing (NGS) technologies have been widely used to screen for viral integrations in cancer genomes, and a number of bioinformatics tools have been developed to detect viral integrations using NGS data. However, there has been no systematic comparison of ...

Subunit Mass Analysis for Monitoring Multiple Attributes of Monoclonal Antibodies.

Multi-Attribute Methods (MAMs) are appealing due to their ability to provide data on multiple molecular attributes from a single assay. If fully realized, such tests could reduce the number of assays required to support a product control strategy while providing equivalent or greater product understanding relative to the conventional approach. In doing so, MAMs have the potential to decrease development and manufacturing costs by reducing the number of tests in a release panel.

An unexploited dimension: new software for mixture analysis by 3D diffusion-ordered NMR spectroscopy.

3D DOSY experiments have the potential to provide unique and valuable information but are underused, in part due to the lack of efficient processing software. Here we illustrate the power of 3D DOSY and present MAGNATE (Multidimensional Analysis for the GNAT Environment), an open-source and free software package for the analysis of pulsed field gradient (PFG) 3D NMR diffusion data, distributed under the GNU General Public Licence. The new software makes it possible for the first time to efficiently analyse ...

A unified framework for link prediction based on non-negative matrix factorization with coupling multivariate information.

Many link prediction methods have been developed to infer unobserved links or predict missing links based on the observed network structure that is always incomplete and subject to interfering noise. Thus, the performance of existing methods is usually limited in that their computation depends only on input graph structures, and they do not consider external information. The effects of social influence and homophily suggest that both network structure and node attribute information should help to resolve th...

Correction: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

[This corrects the article DOI: 10.1371/journal.pone.0203225.].

PolyQTL: Bayesian Multiple eQTL Detection with Control for Population Structure and Sample Relatedness.

Expression quantitative loci (eQTL) are being used widely to annotate and interpret GWAS hits. Recent studies have demonstrated that individual gene expression is often regulated by multiple independent cis-acting eQTL. Diverse methods, frequentist and Bayesian, have already been developed to simultaneously detect and fine-map such multiple eQTL, but most of these ignore sample relatedness and potential population structure. This can result in false positives and disrupt the accuracy of fine-mapping. Here w...

Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.

We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are used. Our proposal enjoys several advantages. Firstly, multi-keyword search is available, and only when a data user's attribute set satisfies access policy in keyword index, and keyword token generated by data user matches index successfully, then data user can obtain ciphertext containing keywords. In this way, ...

A comparison of different methods to handle missing data in the context of propensity score analysis.

Propensity score analysis is a popular method to control for confounding in observational studies. A challenge in propensity methods is missing values in confounders. Several strategies for handling missing values exist, but guidance in choosing the best method is needed. In this simulation study, we compared four strategies of handling missing covariate values in propensity matching and propensity weighting. These methods include: complete case analysis, missing indicator method, multiple imputation and co...

Cognitive Versus Software Fusion for MRI Targeted Biopsy: Experience Before and After Implementation of Fusion.

To compare the diagnostic performance of the two most common approaches of MRI targeted biopsy (TB) - cognitive registration (COG-TB) and software fusion (FUS-TB) - we assessed our institutional experience with both methods. TB has emerged to complement systematic template biopsy (SB) in prostate cancer (PCa) diagnosis; however, which MRI targeting methodology is diagnostically better remains unclear.

Repeatability and reproducibility of FreeSurfer, FSL-SIENAX and SPM brain volumetric measurements and the effect of lesion filling in multiple sclerosis.

To compare the cross-sectional robustness of commonly used volumetric software and effects of lesion filling in multiple sclerosis (MS).

Automated UHPLC separation of 10 pharmaceutical compounds using software-modeling.

Human mistakes are still one of the main reasons of underlying regulatory affairs that in a compliance with FDA's Data Integrity and Analytical Quality by Design (AQbD) must be eliminated. To develop smooth, fast and robust methods that are free of human failures, a state-of-the-art automation was presented. For the scope of this study, a commercial software (DryLab) and a model mixture of 10 drugs were subjected to testing. Following AQbD-principles, the best available working point was selected and confor...

Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.

With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storag...

Volumetric analysis at abdominal CT: oncologic and non-oncologic applications.

Volumetric analysis is an objective 3D assessment of a lesion or organ that may more accurately depict the burden of complex objects compared to traditional linear size measurement. Small changes in linear size are amplified by corresponding changes in volume, which could have significant clinical implications. Though early methods of calculating volumes were time-consuming and laborious, multiple software platforms are now available with varying degrees of user-software interaction ranging from manual to f...

3D Organ Modeling with Open-Source Software.

To date, 3D organ modeling has not reached widespread clinical use, despite showing promise in medical literature. The majority of anatomic modeling that is presented in the literature is performed with proprietary software, presenting certain barriers to use such as price for usage rights. Open-source software not only circumvents this barrier, but also often provides greater customization offered by global communities. In this proof-of-concept experiment, a HeartMate II LVAD was "virtually fit" in a patie...

DVH Analytics: A DVH database for clinicians and researchers.

In this study, we build a vendor-agnostic software application capable of importing and analyzing non-image-based DICOM files for various radiation treatment modalities (i.e., DICOM RT Dose, RT Structure, and RT Plan files). Dose-volume histogram (DVH) and planning data are imported into a SQL database, and methods are provided to manage, edit, view, and download data. Furthermore, the software provides various analytical tools for plan evaluations, plan comparisons, benchmarking, and plan outcome predictio...

isiKnock: in silico knockouts in signaling pathways.

isiKnock is a new software that automatically conducts in silico knockouts for mathematical models of signaling pathways. The software allows for the prediction of the behavior of biological systems after single or multiple knockout. The implemented algorithm applies transition invariants and the novel concept of Manatee invariants. A knockout matrix visualizes the results. The tool enables the analysis of dependencies, for example, in signal flows from the receptor activation to the cell response at steady...

Methods for the analysis of multiple endpoints in small populations: A review.

While current guidelines generally recommend single endpoints for primary analyses of confirmatory clinical trials, it is recognized that certain settings require inference on multiple endpoints for comprehensive conclusions on treatment effects. Furthermore, combining treatment effect estimates from several outcome measures can increase the statistical power of tests. Such an efficient use of resources is of special relevance for trials in small populations. This paper reviews approaches based on a combina...

Multiple sclerosis relapse: Qualitative findings from clinician and patient interviews.

In patients with relapsing forms of multiple sclerosis (MS), relapses are often unrecognized. These missed relapses have broad implications for the conduct of clinical trials as well as for the care and prognosis of people with multiple sclerosis (MS). With the ultimate goal of developing new methods to identify relapse, the purpose of this qualitative research with patients and clinicians was to examine the definition, symptoms, and impact of relapse.

Dissemination of novel biostatistics methods: Impact of programming code availability and other characteristics on article citations.

As statisticians develop new methodological approaches, there are many factors that influence whether others will utilize their work. This paper is a bibliometric study that identifies and quantifies associations between characteristics of new biostatistics methods and their citation counts. Of primary interest was the association between numbers of citations and whether software code was available to the reader.

Parallelization of CPPTRAJ enables large scale analysis of molecular dynamics trajectory data.

Advances in biomolecular simulation methods and access to large scale computer resources have led to a massive increase in the amount of data generated. The key enablers have been optimization and parallelization of the simulation codes. However, much of the software used to analyze trajectory data from these simulations is still run in serial, or in some cases many threads via shared memory. Here, we describe the addition of multiple levels of parallel trajectory processing to the molecular dynamics simula...

Verification of modified receiver-operating characteristic software using simulated rating data.

ROCKIT, which is a receiver-operating characteristic (ROC) curve-fitting software package, was developed by Metz et al. In the early 1990s, it is a very frequently used ROC software throughout the world. In addition to ROCKIT, DBM-MRMC software was developed for multi-reader multi-case analysis of the difference in average area under ROC curves (AUCs). Because this old software cannot run on a PC with Windows 7 or a more recent operating system, we developed new software that employs the same basic algorith...


Advertisement
Quick Search
Advertisement
Advertisement